Upwind and Microsoft Bring Runtime First Security to Azure Marketplace

  • Thread Author
Upwind’s new partnership with Microsoft signals a clear market shift: runtime-first security is moving from specialized add‑ons into Azure’s native procurement and operational flow, promising real‑time protection, prioritized vulnerability guidance, and a tighter path to enterprise deployment through the Azure Marketplace and Microsoft’s partner programs.

Background / Overview​

The headline here is straightforward: Upwind — a company positioning itself as a “runtime‑first” cloud security vendor — has announced a partnership with Microsoft to deliver an integrated runtime security experience for Azure workloads that is available through the Azure Marketplace, carries co‑sell status, and is eligible for Microsoft Azure Consumption Commitment decrements. That combination is designed to simplify procurement and accelerate adoption for enterprise customers running containerized, serverless, and other cloud‑native workloads on Azure.
Upwind’s announcement frames the product as a single, unified experience that merges runtime protection, posture management, and vulnerability detection. The integration is presented as deeply aligned with Azure services: the platform ingests Azure cloud audit logs, maps to cloud posture frameworks, pulls in Azure Container Registry (ACR) scan results, and accelerates onboarding for cloud assets — effectively collapsing workflows that often require multiple tools and hours of manual correlation into a single pane of glass.
Gartner’s recent industry positioning — runtime visibility as a critical control for dynamic cloud environments — is quoted in the release to justify the runtime‑first approach, and Upwind promises further expansion of the integration to cover identity protection, external internet exposure, and GenAI workloads in the coming months. These road‑map items are notable and reflect where customers and vendors see the next wave of cloud risk.

What exactly did Microsoft and Upwind announce?​

The core product claim​

  • A unified Azure security solution that brings together:
  • Runtime protection backed by eBPF‑powered detection for live workload behavior.
  • Cloud posture management (CSPM) to track and remediate misconfigurations.
  • Vulnerability detection that factors in runtime context to prioritize what’s truly exploitable.
  • Availability on the Azure Marketplace, with co‑sell status and Azure Consumption Commitment decrement eligibility — both designed to reduce procurement friction and align Upwind’s commercial model with Microsoft customers’ buying practices.
  • Technical alignment includes direct integration with Azure audit logs, ACR scan outputs, and streamlining onboarding of Azure cloud assets so teams gain near‑instant, prioritized, actionable findings rather than siloed alerts.

The runtime angle: eBPF + agentless telemetry​

Upwind stresses a hybrid visibility model: agentless discovery combined with eBPF‑powered runtime detection inside Linux‑based workloads. That matters because it allows the product to see both configuration-level risks (the outside‑in view) and live exploitation or anomalous in‑process behavior (the inside‑out view). The vendor frames this as fundamentally different from posture‑only solutions that can leave blind spots in dynamic, ephemeral environments.

Why this matters to Azure customers​

1) Closing the “what matters now” gap​

Traditional vulnerability scanners and posture tools generate enormous volumes of findings. Without runtime context, defenders struggle to prioritize which vulnerabilities are exploitable in production. Upwind’s central promise is to fuse runtime telemetry with vulnerability and posture signals so security teams can focus on issues that are both present in code/configuration and actively exploitable right now. That can materially reduce mean time to detect and respond for real attacks.

2) Tighter procurement and operations via Azure Marketplace and co‑sell​

Making the solution available on the Azure Marketplace and qualifying it for co‑sell and consumption commitment decrements lowers friction for customers who purchase and deploy via Microsoft channels. For enterprises that operate with strict procurement pipelines tied to Microsoft agreements, that can shave weeks off procurement and make vendor evaluation simpler. The announcement explicitly calls out these commercial alignments as a competitive advantage.

3) Serverless and multi‑cloud coverage​

The press materials highlight runtime visibility for serverless workloads and a multi‑cloud posture, which is important for organizations that run mixed environments (AKS, Azure Functions, other clouds). Extending runtime detection into serverless containers and function platforms is nontrivial; if Upwind executes on this, it fills a frequently noted blind spot. However, customers should validate the vendor’s serverless coverage model and performance considerations in a proof‑of‑concept before full production deployment.

Technical analysis: strengths, design choices, and trade‑offs​

Strengths​

  • Runtime context reduces signal noise. Combining behavioral detection with configuration and vulnerability data should reduce false positives and help prioritize remediation tasks that materially reduce risk. This is the core technical value proposition.
  • eBPF as a visibility enabler. eBPF lets agents collect high‑fidelity system and process telemetry in modern Linux workloads with relatively low overhead compared with heavier kernel hooks or instrumentation. For containerized workloads in AKS or other Kubernetes environments, eBPF is now a mainstream, efficient approach to runtime observability. Upwind’s claim of eBPF‑powered detection is therefore aligned with current technical best practice.
  • Azure-native integrations. Ingesting Azure audit logs and ACR scan results makes the offering more useful to Azure customers; those connections reduce the need for additional log‑shipping work. Marketplace availability and co‑sell status also help with governance and procurement.

Risks and trade‑offs​

  • Vendor claims require independent validation. The press release contains commercial metrics (900% year‑over‑year revenue growth, 200% logo growth, $430M raised) and analyst recognitions. These are important signals but should be treated as company‑reported until independently verified. Enterprises should perform their own diligence and check analyst reports and customer references prior to enterprise roll‑out.
  • Performance and stability considerations with eBPF. While eBPF is efficient, its misuse or misconfiguration can introduce kernel‑level complexity. Production customers must benchmark CPU/memory overhead, ensure kernel compatibility across their node images, and confirm support for any custom kernel modules or managed node service plans on AKS. The press materials don’t publish performance figures; that must be tested during pilots.
  • Overlap with Microsoft Defender and Sentinel — potential for friction. Azure already provides capabilities through Microsoft Defender for Cloud and integration points to Sentinel. Upwind’s value depends on the depth and quality of telemetry, detection fidelity, and the ease with which it can feed Sentinel/Defender workflows or replace existing tooling. Customers will need to assess how Upwind integrates with Defender for Cloud’s posture features and Sentinel’s analytics, and whether it creates blind spots or redundant alerts in current workflows. The announcement emphasizes integration but does not detail data models or mapping to existing Azure security controls.
  • Data residency, privacy, and telemetry governance. Any runtime platform that captures process, network, and container metadata must provide clear controls for telemetry retention, encryption, and where telemetry is stored. Large regulated customers will require contractual guarantees and the ability to host telemetry in-region. The press release doesn’t show contractual detail; procurement teams should demand SOC/ISO attestations and data processing addenda as part of the SOW.

Market and competitive context​

CNAPP and the runtime-first trend​

Upwind positions itself as a next‑generation CNAPP (Cloud Native Application Protection Platform) with runtime detection at the center. This mirrors an industry trend Gartner and other analysts have described: as cloud deployments grow more dynamic, runtime visibility becomes essential to close gaps left by posture‑only tools. The vendor cites analyst recognition and awards to validate its market momentum. Those recognitions are signals, but buyers should cross‑check these claims against analyst research and peer reviews when making decisions.

Where Upwind fits vs. cloud‑native security incumbents​

Incumbent providers often split responsibilities across several products: CSPM for posture, SCA (software composition analysis) for dependencies, vulnerability scanners for images, and EDR for endpoints. Upwind’s approach attempts to converge these signals with runtime telemetry. This could be attractive to customers tired of "tool sprawl," but it raises questions:
  • Does the unified approach scale to the telemetry volumes of global enterprise fleets?
  • Can a single product keep pace with deep scanner capabilities and vulnerability research that specialized vendors provide?
  • How mature are the integrations with third‑party dev toolchains, CI/CD pipelines, and Azure governance controls?
These are practical considerations security architects should evaluate in pilots.

Commercial implications: co‑sell status and Azure Consumption Commitment decrement​

Upwind’s Marketplace listing, co‑sell status, and full Azure Consumption Commitment decrement eligibility are not merely marketing copy; they materially influence procurement:
  • Co‑sell status typically means Microsoft field sellers can jointly engage and may include joint go‑to‑market motions, which can accelerate enterprise procurement cycles.
  • Eligible solutions for Azure Consumption Commitment decrements can be counted against customer commitments to Microsoft, potentially making purchase decisions financially attractive for customers with existing Azure spend agreements.
However, the exact impact varies by customer contract and regional Microsoft programs — procurement teams should confirm eligibility and expected accounting treatment with their Microsoft account teams prior to contract signature. The announcement couches these benefits as advantages; enterprises should confirm the precise commercial mechanics in their own environments.

Real customer signals and analyst recognition — reading between the lines​

The announcement cites a Petrofac testimonial describing fast time‑to‑value in strengthening AKS security within hours of onboarding. Vendor case studies and testimonials can show real operational benefits, but readers should interpret them as single data points and seek multiple references across industries and geographies.
Upwind’s release also lists awards and analyst placement (Frost & Sullivan, GigaOm, Gartner mentions, QKS Group SPARK Matrix™, ISMG, Latio), and a near‑perfect Gartner Peer Insights rating in CNAPP. These are relevant market signals; at the same time, buyers should consult those analyst reports directly (and look for the methodology and sample size) to understand how those rankings were derived and whether they reflect long‑term technical differentiation or short‑term vendor momentum.

Practical guidance for Azure teams evaluating Upwind​

If you are an Azure security owner or platform engineer, here is a pragmatic checklist to evaluate Upwind (or any runtime‑first CNAPP) before enterprise rollout.
  • Pilot scope and goals
  • Define a small, representative set of workloads (AKS clusters, ACR images, serverless functions).
  • Agree measurable goals: false positive rate targets, detection latency, prioritized vulnerability reduction.
  • Telemetry and integration validation
  • Confirm the product ingests Azure audit logs and ACR results as claimed, and verify the mapping to your CSPM findings.
  • Test data export to Microsoft Sentinel and Defender for Cloud to ensure alerts, playbooks, and SOAR workflows behave as expected.
  • Performance and compatibility testing
  • Run performance benchmarks for eBPF probes across node sizes and workload profiles.
  • Verify kernel compatibility and support for your managed node OS images.
  • Security and compliance due diligence
  • Request SOC 2/ISO attestations, data processing agreements, and region controls for telemetry storage.
  • Understand how the platform stores, masks, and retains sensitive telemetry (secrets, PII).
  • Operational playbooks
  • Define who in the SOC will handle runtime alerts and integrate Upwind findings into existing incident response runbooks.
  • Ensure DevOps teams have clear remediation ownership for prioritized findings.
  • Licensing and procurement confirmation
  • Clarify Marketplace license terms, co‑sell benefits, and Azure Consumption Commitment decrement eligibility with Microsoft account teams and procurement.

What to watch next​

  • Identity and internet exposure coverage. Upwind announced plans to extend its integration to identity protection and internet exposure in the coming months. These areas are frequent vectors for compromise, and the depth of this integration will be a crucial differentiator. Monitor how the vendor maps signals from Entra ID/Identity Protection and external asset scanning into runtime prioritization.
  • GenAI workload protections. The press release promises future coverage for GenAI workloads. That’s a logical next step since GenAI systems introduce new data‑flow and model‑serving risk profiles, but specifics will matter: will Upwind protect model serving pipelines, injection risks, prompt leakage, or only the underlying compute workloads? Customers should demand detail and test cases.
  • Ecosystem interoperability. Expect more scrutiny on how Upwind meshes with Defender for Cloud, Sentinel, and other SIEM/SOAR systems. Clear, documented event schemas, support for Azure Monitor tables, and native playbook recipes will be differentiators.

Final assessment: pragmatic optimism with guarded diligence​

Upwind’s partnership with Microsoft is a meaningful market signal. Delivering a runtime‑first CNAPP through the Azure Marketplace, with co‑sell status and consumption commitment alignment, lowers barriers for large enterprises to pilot and adopt runtime defenses — an important step given the pace and complexity of modern cloud deployments. The combination of eBPF runtime telemetry, Azure audit log and ACR integrations, and a single‑pane approach addresses a well‑documented operational pain: too many signals, too few contextual prioritizations.
That said, the announcement mixes product claims, customer testimonials, and vendor‑reported growth metrics that require independent verification. Enterprises should conduct thorough pilots focusing on performance, compatibility, telemetry governance, and integration with existing Microsoft security investments. Key questions remain around long‑term operational scale, overlap with Defender for Cloud, and the practical detail of upcoming capabilities (identity, internet exposure, and GenAI protections). These are not blockers — they are the exact things a risk‑aware buyer should validate during evaluation.
For Azure security teams willing to test runtime‑first approaches, Upwind’s Marketplace presence and partner alignment make it easy to get started; the technical and commercial architecture described in the announcement is promising. But the usual discipline applies: test in production‑like conditions, validate resource impacts and detection fidelity, and lock down telemetry and contractual controls before wide rollout. If the vendor’s future roadmap delivers on identity and GenAI protections with the same depth as its runtime detection claims, this partnership could reshape how enterprises think about cloud workload security inside Azure.

Quick takeaways​

  • Upwind + Microsoft moves runtime‑first security into the Azure channel and procurement flow.
  • The solution promises to combine eBPF runtime detection with posture and vulnerability signals to prioritize exploitable risks.
  • Marketplace availability, co‑sell status, and consumption commitment eligibility ease enterprise procurement — but confirm details with your Microsoft account team.
  • Validate performance, kernel compatibility, telemetry governance, and Sentinel/Defender integration through real pilots before broad deployment.
Upwind’s announcement is a welcome development for defenders who have been asking for runtime awareness to be more than an optional bolt‑on: it’s now being offered as an Azure‑native experience. The onus is on customers to confirm the vendor’s claims in their own environments and on both companies to deliver the promised depth of integration as the product expands into identity and GenAI scenarios.

Source: StreetInsider Upwind Partners with Microsoft to Deliver Runtime Security for Azure Workloads
 
Upwind’s new partnership with Microsoft moves runtime security from the margins into Azure’s native procurement and operational flow, delivering a single, runtime-first experience for protection, compliance, and vulnerability management across Azure workloads. The announcement—detailed in the vendor’s press materials and the company’s Azure partner pages—says the integrated solution will be available on the Microsoft Marketplace, is IP co‑sell and Azure Consumption Commitment (MACC) eligible, and will expand to cover identity, internet exposure, and GenAI workloads over the coming months. /www.upwind.io/partners/azure)

Background / Overview​

Enterprises have long stitched together cloud security from disparate tools: CSPM for posture, image scanners for registries, CWPP agents for runtime, and separate vulnerability and identity tooling. Upwind’s pitch is simple but consequential: bring runtime-first detection and protection into the same product surface as posture, registry scanning, and prioritized vulnerability management so teams can see what’s actually happening inside workloads and act on exploitability rather than theoretical risk. The vendor states the integration draws directly from Azure audit logs, Azure Container Registry (ACR) scans, and native CSPM signals to give security and platform teams prioritized, actiol time.
This partnership arrives while Upwind is scaling rapidly: the company closed a $250 million Series B in January 2026 that pushed its total funding to about $430 million and reportedly produced a unicorn valuation near $1.5 billion. Independent reporting confirms the round and the growth trajectory Upwind cites—figures the vendor uses to underline market momentum as it deepens Microsoft integration.

Why this matters: the runtime visibility gap​

The cloud-native threat model has shifted: attackers exploit running services, ephemeral containers, and serverless functions that are invisible to traditional scan-only tools. Static image scans and infrequent posture checks cannot show:
  • which vulnerable code paths are exercised at runtime,
  • whether an exploitable library is actually reachable by network flows, or
  • whether identities, tokens, or service principals are being misused within live workloads.
Security teams must now answer not only “what’s vulnerable?” but “what’s exploitable right now?” Upwind’s stated differentiator is pairing agentless cloud metadata and registry scanning with a lightweight, eBPF-poweat observes process, network, and API behavior at the kernel level. The combined model aims to reduce alert noise and highlight truly actionable remediation.
Gartner and other analyst commentary has also signaled the importance of runtime visibility in modern CNAPP strategies, increasing the pressure on vendors and buying organizations to include live workload telemetry in their risk models rather than relying solely on posture or build-time scanning. Upwind’s messaging explicitly references the Hype Cycle and CNAPP market guides as market validation for this runtime-first approach.

What the Microsoft integration delivers​

Single-pane Azure experience​

Upwind says the integration stitches together Azure audit logs, CSPM frameworks, ACR scanning, and automated asset onboarding so customers can see posture and runtime signals in one place. For Azure-centric teams, the marketplace and co-sell status are designed to reduce procurement friction and enable tighter operational alignment with Azure-native workflows.

Runtime-first telemetry (eBPF)​

A core technical point: Upwind’s sensor uses eBPF to collect rich kernel-level telemetry in containers and VMs without requiring heavy, kernel-modifying agents. eBPF provides process-level visibility, syscall tracing, and network context with a comparatively low footprint—important for high-density Kubernetes and serverless environments. Upwind has publicly documented how eBPF underpins its runtime detection and adaptive scanning capabilities.

Registry and vulnerability context​

The product maps image and registry scanning results to live runtime context, exposing whether a vulnerable package exists in an image and whether that vulnerable code is even reachable or executed in production. This correlation helps prioritize fixes and reduces time-to-remediation by surfacing exploitability instead of raw CVE counts. Upwind’s documentation and recent product posts describe registry scanning that runs inside clusters and ties scan results to runtime signals.

Sentinel and Defender for Cloud compatibility​

The vendor states the integration will feed enriched runtime telemetry and prioritized signals into Microsoft Sentinel and Defender for Cloud for broad SOC correl matters for teams that already normalize incidents into Microsoft’s security stack and want to avoid toolchain friction. Upwind’s partner materials list Sentinel and Defender for Cloud among supported integrations.

Technical strengths and practical advantages​

  • Runtime context reduces false positives. By correlating runtime evidence with vulnerability and configuration data, the platform helps SOCs focus on what’s being used and abused now, not on theoretical findings that may never arise in production. This addresses a core pain point in CNAPP deployments: signal overload.
  • Lightweight eBPF instrumentation. eBPF enables deep visibility without the constant resource drain of full agents, which is especially useful in multi-tenant Kubernetes clusters and serverless platforms where resource noise matters. Upwind’s own performance notes claim low memory usage in large image scans, which is consistent with public documentation describing eBPF’s efficiency.
  • Agentless + agent model offers coverage parity. Combining agentless API-based scans with a runtime sensor provides a pragmatic middle ground: teams get broad discovery across subscriptions and registry data while also gaining high-fidelity runtime telemetry where it matters. This hybrid model reduces blind spots without forcing full instrumentation everywhere.
  • Marketplace and co-sell simplify procurement. IP co‑sell and MACC eligibility mean customers can buy via Microsoft channels and potentially offset consumption through existing Azure spend commitments—an operational and financial convenience for enterprise buyers deep in the Microsoft ecosystem. Upwind’s partner pages and the vendor announcement emphasize this channel alignment.

Real-world use cases and customer signals​

Upwind highlights early traction in regulated industries—financial services, healthcare, and energy—where runtime risk translates directly into compliance and business risk. One quoted customer (Petrofac) reported meaningful, immediate recommendations for AKS security within hours of onboarding, which illustrates the practical speed advantage of runtime observability. While vendor-supplied customer quotes always require due diligence, independent analyst commentary and third-party case references suggest genuine enterprise adoption.
Common operational outcomes we expect from this integration include:
  • Faster triage of high-priority findings because vulnerability data is contextualized with live traffic and process execution.
  • Reduced mean time to respond (MTTR) by giving platform teams exact attack paths and service-to-service relationships rather than isolated findings.
  • Better cross-team collaboration: developers, platform engineers, and SOCs operate from the same contextual map of runtime behavior.

Scrutiny: claims that deserve verification​

Several of the vendor’s market and performance claims are plausible—but should be treated with journalistic caution and independently verified by customers during proof-of-concept phases.
  • 900% year-over‑year revenue growth and 200% logo growth. Multiple reporting outlets covering Upwind’s January 2026 Series B corroborate rapid revenue and customer growth numbers, but vendors sometimes report different baselines and time windows. Prospective buyers should ask for audited metrics or sales references to validate growth claims in their specific sector.
  • Analyst accolades (Gartner, Frost & Sullivan, ISMG). Upwind’s press materials and third-party PR indicate inclusion in Gartner market guides and Frost & Sullivan awards; these raise the company’s profile but not necessarily its suitability for every buyer. Analysts’ listings and quotes should be read as directional market validation rather than definitive technical certification. Customers should map analyst criteria to their operational requirements.
  • “Seamless” integration with Microsoft security products. Upwind’s marketplace listing and partner pages document integration points, but the depth of that integration varies by feature. Buyers should confirm which telemetry is actively ingested into Microsoft Sentinel, which playbooks are available, and whether automated remediation actions are supported natively or require custom connectors.
When vendor claims touch procurement (MACC eligibility, co‑sell status) or analyst recognition, independent confirmation—by checking the Microsoft Partner listing, marketplace offer details, and analyst reports—is a sensible step during evaluation.

Risks, tradeoffs, and deployment considerations​

  • Operational complexity at scale. Adding runtime sensors—however lightweight—introduces another operational surface. Enterprises must design rollout strategies (namespaces, daemonset policies, image admission controls) to avoid accidental resource constraints or policy conflicts in high-density clusters.
  • False sense of coverage. Runtime-first is powerful, but not a silver bullet. Effective cloud security combines secure build pipelines, hardened base images, robust identity governance (Entra ID/AD), network segmentation, and runtime detection. Organizations that double down on runtime telemetry while neglecting developer and CI/CD practices will still be exposed.
  • Data residency and telemetry governance. Feeding enriched runtime and identity telemetry into third-party platforms (and into Microsoft Sentinel) raises questions about data residency, retention policies, and regulatory compliance—especially for heavily regulated verticals. Buyers should assess telemetry flows and retention options before large-scale deployment.
  • Reliance on eBPF in diverse environments. eBPF is mature and broadly supported on modern Linux kernels, but some enterprise environments use older kernels, customized distros, or constrained edge devices where eBPF featureset is limited. Confirm kernel compatibility and fallback modes for unsupported nodes.
  • Integration testing with Microsoft security stack. The vendor’s Marketplace listing and co-sell status indicate strong partnership intent, but actual operational integration—the maturity of Sentinel parsers, Defender for Cloud mapping, and automated playbooks—should be validated in test environments to confirm the promised “single experience” materializes in practice.

How to evaluate Upwind + Microsoft in your environment​

If you’re a security or platform leader considering this integrated offering, walk through the following practical steps.
  • Define the scope: identify critical subscriptions, AKS clusters, ACR registries, and serverless functions you want covered.
  • Confirm kernel compatibility for eBPF sensors across node pools and edge nodes.
  • Run a proof of value for 30–60 days, focusing on:
  • What percent of high-severity CVEs are mapped to active runtime execution?
  • How many noisy alerts are eliminated by correlating runtime evidence?
  • How quickly can platform teams remediate a prioritized exploit path?
  • Validate Microsoft integration:
  • Can Upwind alerts be ingested into Microsoft Sentinel with the right metadata?
  • Does Defender for Cloud accept Upwind’s posture and runtime signals in ways that support policy-based automation?
  • Assess procurement channels and cost:
  • If buying through Azure Marketplace, quantify the impact of MACC eligibility on your Azure commitments.
  • Review licensing models (ingestion rates, sensor counts, preservation windows) and projected monthly consumption costs.
This operational checklist reduces vendor buzzwords to measurable outcomes and ensures the runtime-first promise translates into reduced risk and better operational efficiency.

Market context and competition​

Upwind joins a competitive CNAPP and runtime security market where players emphasize different tradeoffs: static scanning and posture (CSPM-first), deep runtime behavioral detection (eBPF-based vendors), or extensive cloud graph analytics (API-only vendors). The unique angle here is embedding runtime-first signals in Azure’s procurement and telemetry fabric—an enterprise buyer advantage if the technical integration is robust.
Independent market coverage of Upwind’s funding round and its analyst mentions indicates strong investor and industry interest in runtime-first approaches. Multiple outlets reported Upwind’s $250M Series B and consequent valuation, which underpins the company’s public claims about growth and market position. Still, buyers should compare feature maps, detection efficacy, and operational overhead against established alternatives before committing.

Final assessment: a practical step forward, with caveats​

Upwind’s Microsoft partnership represents a pragmatic and meaningful evolution in how enterprises can consume runtime security for Azure workloads. The combined offering—marketplace availability, co-sell readiness, and Sentinel/Defender integration—lowers adoption friction for organizations already committed to the Microsoft stack. For teams that have struggled with alert fatigue and the difficulty of prioritizing vulnerabilities, the promise of runtime-first signal correlation is compelling and maps directly to concrete operational outcomes like faster triage and fewer false positives.
However, the benefits come with responsibilities. Architecture and kernel compatibility checks, integration testing with Sentinel and Defender for Cloud, and realistic performance and cost modeling are essential. Vendor-provided growth claims and analyst placements are useful validation signals, but they are not substitutes for hands-on evaluation—especially where regulated data, identity governance, or mission-critical SLAs are involved. Independent reporting on the vendor’s funding and market recognition corroborates Upwind’s capacity to scale, but real-world success will depend on the product’s fit with each organization’s operational model.

Practical recommendations for WindowsForum readers​

  • If you run significant Azure workloads, schedule a technical POC that includes:
  • Ingesting a subset of AKS clusters, ACR registries, and a representative serverless workload.
  • Testing Sentinel ingestion and a Defender for Cloud playbook for at least one use case (e.g., exploit path detection → role remediation).
  • Ask the vendor for:
  • Detailed kernel compatibility matrices for eBPF features.
  • Examples of mapped exploitation paths showing how CVEs were deprioritized because they were not exercised at runtime.
  • References from customers in similar regulatory environments (finance, healthcare, energy).
  • Treat MACC and co-sell status as procurement conveniences, not technical guarantees. Confirm marketplace SKU details and whether billing will align with your existing Azure commitments.
  • Keep a balanced stack: runtime-first tooling should complement, not replace, secure build pipelines, IaC scanning, and robust identity governance practices (Entra ID / Azure AD).

Upwind’s Microsoft partnership is a noteworthy step in maturing runtime security inside a major cloud ecosystem. For enterprises that want to reduce operational noise and prioritize what’s truly exploitable in Azure, a runtime-first CNAPP available through the Azure Marketplace closes important gaps—provided integration depth, operational overhead, and telemetry governance meet the organization’s practical needs. Prospective buyers should validate the vendor’s technical claims in short, focused pilots, confirm Microsoft integration behavior in their Sentinel/Defender configurations, and assess long-term operational and cost implications before broad rollout.

Source: The AI Journal Upwind Partners with Microsoft to Deliver Runtime Security for Azure Workloads | The AI Journal